1 - 10 of 518 results (total unclustered: 518
Updated May 9, 2016 12:00 am
Inventory scans collect metadata only. They are the fastest scans, and thus the usual starting point in determining what scans are needed.
Updated April 4, 2018 12:00 am
Whitelists are collections of items that you want the system to ignore.
Monitor the results of incident and operational event tasks.
Updated September 24, 2018 12:00 am
The hit highlighting option helps administrators identify exactly which sensitive content caused an event. Evidence is a copy of the data that caused a security event to be posted to the DLP Incident Manager.
Updated February 18, 2019 12:00 am
Remediation scans use rules to detect and take action on sensitive files.
To protect confidential information, and to meet legal demands in some markets, McAfee DLP Endpoint offers a data redaction feature. Permission sets define different administrative and reviewer roles in McAfee DLP software.
Updated April 25, 2018 12:00 am
Revision numbers are automatically assigned to policies, and are used for troubleshooting and DLP Help Desk override key creation.
McAfee DLP uses McAfee ePO Users and Permission Sets to assign different parts of the McAfee DLP administration to different users or groups. McAfee DLP uses REST (REpresentational State Transfer) architecture for certain functions to reduce bandwidth. McAfee DLP permission...
You'll need to create two mail connectors. The first connector sends emails from Office 365 to MVISION Cloud for inspection, and the second accepts emails after they were scanned by MVISION Cloud.
For McAfee DLP Endpoint, business justification definitions define parameters for the justification prevent action in rules.